Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not escape the file path and the project name for the Log file field form validation, resulting in a stored cross-site scripting vulnerability exploitable by attackers with Item/Configure permission.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1906 | Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not escape the file path and the project name for the Log file field form validation, resulting in a stored cross-site scripting vulnerability exploitable by attackers with Item/Configure permission. |
Github GHSA |
GHSA-wmxx-2pvr-x7j6 | Jenkins Sonargraph Integration Plugin vulnerable to Stored Cross-site Scripting |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 02 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-01-02T19:05:01.388Z
Reserved: 2023-06-14T08:58:33.245Z
Link: CVE-2023-35145
Updated: 2024-08-02T16:23:59.354Z
Status : Modified
Published: 2023-06-14T13:15:12.067
Modified: 2025-01-02T19:16:23.137
Link: CVE-2023-35145
OpenCVE Enrichment
No data.
EUVD
Github GHSA